Skip to main content

Falco Github Action

Falco is an open-source runtime security tool originally developed by Sysdig that detects suspicious behavior in real time by monitoring system calls and Kubernetes activity.

Falco helps teams identify unexpected application behavior, security threats, and policy violations in containerized and cloud-native environments.

Key Features of Falco

  • Runtime Threat Detection: Detects abnormal behavior during application execution.
  • Kubernetes Native: Monitors pods, containers, nodes, and Kubernetes audit events.
  • Rule-Based Engine: Uses YAML-based rules to define allowed and disallowed behavior.
  • Real-Time Alerts: Triggers alerts instantly when suspicious activity occurs.
  • Extensible Outputs: Send alerts to Slack, SIEM, Prometheus, Webhooks, and more.
  • Lightweight & Scalable: Designed for production Kubernetes clusters.

As part of Ananta Cloud’s runtime security strategy, we provide a standardized GitHub Action and deployment pattern for Falco to help teams enforce runtime security policies consistently.

What It Does?

  • Monitors container and host activity in real time.
  • Detects suspicious processes, file access, and network activity.
  • Generates security alerts based on predefined rules.
  • Integrates with Ananta Cloud’s observability and security stack.
  • Enhances runtime visibility across workloads.

Benefits of Using Ananta Cloud’s Falco Integration

  • Real-Time Security Visibility
  • Early Threat Detection
  • Reduced Incident Response Time
  • Kubernetes Runtime Protection
  • Consistent Security Policies Across Clusters

Supported Inputs

NameDescriptionRequired
rules-fileCustom Falco rules file pathNo
output-formatAlert output formatNo
severityMinimum alert severityNo
namespaceKubernetes namespace to monitorNo

Supported Outputs

None

Usage

- name: Enable Falco runtime security
uses: anantacloud/actions/tree/main/security/falco
with:
rules-file: falco_rules.yaml